Information Technology Reference
In-Depth Information
messages are guaranteed to be received in order (i.e. if there is a direct radio
link from sender to receiver), and if we assume that no more than 2 k consecutive
messages will ever be lost, then it is only necessary to transmit the k low-order
bits of i .
Of course it is not enough to simply require that each message appears q
times. We are assuming a very low-power network with no acknowledgement or
retransmission protocol, no error-correction mechanism, and occasional loss of
connectivity. Thus we must expect that some messages will be lost, and if m j is
lost, all tags a i such that j
S i will be useless. Therefore every message must
becontainedinmorethan q sets, to provide robustness against the expected
missing messages. The question then becomes, what conditions must we impose
on the sets S i , and what is the optimal way to achieve those conditions?
We first consider the following requirement (more general requirements are
considered in Sect. 4): if any one message is lost, this must not prevent full
authentication of any other message. This means that for any pair of messages
m i ,m j ,wemusthaveatleast q sets which contain m i but not m j .Thusif m j is
lost, we still have enough good tags to authenticate m i with the desired degree
of security.
This “set-cover” approach requires the sender to remember many old mes-
sages. If a node can remember at most v old messages, then we must have
S i
v, i ] for all i . Memory is presumably quite limited since we are dealing
with very low-power nodes. Note that v is also the maximum delay before a
message finally achieves full authentication, which is another reason to limit v .
Thus we have the following problem: Given memory bound v , find sets S i that
maximize q where
[ i
- For each i
N
, S i
[ i
v, i ].
- For each i
= j there are at least q sets S with i
S , j
S .
Given a collection of sets S , define the strength of the collection as
Definition 1
μ ( S )=min
i,j
{
t
|
i
S t ,j
S t }
#
(here # A denotes the size of a set A ). We have defined S as an infinite collection;
such a collection would of course be specified either by rotating through a finite
collection of given sets, or more generally by specifying a way to generate S i
as a function of i . To get the process started, we can implicitly have dummy
messages m −v ,
···
m 1 ,m 0 =0.
3 Sliding-Window Construction
We first consider the special case in which each set S i is defined by a “sliding
window”; we select a set of distances δ =
{
δ 1 <
···
δ k
v
}
and let each S i =
{
i
δ 1 ,
···
i
δ k }
. Without loss of generality we can assume δ 1 =0and δ k = v .
Search WWH ::




Custom Search